Discover the Virtual Air-Gap
Your backups are the new target.
Ransomware has evolved. Modern attackers are no longer content with simply encrypting your production data; they target your backups first, leaving you no choice but to pay.
If they can see your data, they can destroy it.
Beyond immutability: the power of invisibility.
Standard Object Lock is effective, but Covert Copy takes security even further.
Virtual Air-Gap: Protect your data with logical isolation without the cost and complexity of physical tapes.
Hidden Data: Create a copy invisible to anyone connected to the corporate network. Even in the event of unauthorized access, the attacker will not know the bucket exists.
Zero Trust Multi-User Authentication (MUA): No single individual can access or delete a Covert Copy. A "dual-key" approval system by trusted security administrators is required.
Immutable by Default: Once created, it cannot be modified, overwritten, or deleted by ransomware.
During this 20-minute session, we will cover:
The "invisible" architecture: a deep dive into how Covert Copy works and how data is hidden in the administration console
Ransomware recovery demo: live demonstration of a restore from a hidden bucket after a simulated total account compromise
Simplified compliance: how Covert Copy helps you meet SEC, FINRA, HIPAA and GDPR requirements for "Golden Copies"
The cost of peace of mind: why this feature is included for all Wasabi Hot Cloud Storage users (you only pay for the storage, not the feature)
This webinar will be presented in French.
Offered Free by: Wasabi Technologies
See All Resources from: Wasabi Technologies





